Skip navigation

Cyber security countermeasures to combat cyber terrorism

Cyber security countermeasures to combat cyber terrorism

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Full text not available from this repository.

Abstract

In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Item Type: Book Section
Additional Information: [1] Chapter 20 in Section Four: Future Threats and Cyber Security. [2] CMS Ref. No: 13/08. [3] ISBN: 9780124071919 (hbk); 9780124072190 (ebook)
Uncontrolled Keywords: access, attacks, computer, control, critical, cyber attack, cyber security, cyber terrorism, financial, government, industrial, information, insider, international, Internet, management, mechanisms, military, network, nuclear, security, software, Stuxnet, system, terrorist, threats
Subjects: Q Science > Q Science (General)
Pre-2014 Departments: School of Computing & Mathematical Sciences
Related URLs:
Last Modified: 21 Oct 2020 08:00
URI: http://gala.gre.ac.uk/id/eprint/9957

Actions (login required)

View Item View Item